<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0"><id>tag:blogger.com,1999:blog-5930486795538605502</id><updated>2024-12-19T00:16:43.166-03:00</updated><category term="Tips Seguridad"/><category term="Microsoft"/><category term="Soluciones"/><category term="Linux"/><category term="google"/><category term="windows"/><category term="cuidados del pc"/><category term="Windows XP"/><category term="Seguridad informatica"/><category term="Virus"/><category term="Microsoft Windows"/><category term="Programación"/><category term="Seguridad informática"/><category term="Operating system"/><category term="Google Code"/><category term="Operating Systems"/><category term="trabajo"/><category term="Ubuntu"/><category term="Windows Vista"/><category term="google aplicaciones"/><category term="hardware"/><category term="Firefox"/><category term="Window 7"/><category term="Windows XP Professional"/><category term="capacitación"/><category term="windows 7"/><category term="GNOME"/><category term="Google Chrome OS"/><category term="Google Docs"/><category term="Google OS"/><category term="Historia"/><category term="Programacion"/><category term="Ubuntu GNU/Linux"/><category term="chrome"/><category term="Android"/><category term="Antivirus"/><category term="Apple"/><category term="Criptografia"/><category term="Dell"/><category term="Facebook"/><category term="Gmail"/><category term="Google Wave"/><category term="Gripe porcina."/><category term="Messenger"/><category term="Novedades de software"/><category term="P2P"/><category term="Windows Vista Ultimate SP1"/><category term="aplicaciones"/><category term="seguridad wi-fi"/><category term="ASUS Eee PC"/><category term="Astronomía"/><category term="Backup"/><category term="Blog"/><category term="Broadcom 4313 en linux"/><category term="CanSecWest"/><category term="Candid Camera Prank"/><category term="Canonical Ltd."/><category term="Distributions"/><category term="Dropbox"/><category term="E-mail"/><category term="Energy"/><category term="Error windows"/><category term="Examenes a distancia"/><category term="Google Energy"/><category term="Google Sky"/><category term="GoogleWave"/><category term="Gripe A"/><category term="Handhelds"/><category term="IPad"/><category term="IPhone"/><category term="IronPython Studio"/><category term="List of Ubuntu releases"/><category term="MSN Encarta"/><category term="Mac OS"/><category term="Malware"/><category term="Microsoft Visual Studio"/><category term="Mozilla"/><category term="NET Framework"/><category term="Noticias Argentina"/><category term="Plan Igualdad.com.ar"/><category term="Platforms"/><category term="Renewable energy"/><category term="SP1"/><category term="Spam"/><category term="Steve Ballmer"/><category term="Tecnologia"/><category term="Tips perfomance"/><category term="Visual Studio 2008"/><category term="Windows Live Messenger"/><category term="Windows Live Messenger 2010"/><category term="Windows Live OneCare"/><category term="WordPress"/><category term="Wubi"/><category term="Yahoo"/><category term="YouTube"/><category term="Zemanta"/><category term="administrador de sistemas"/><category term="iGoogle"/><category term="mDNSResponder.exe"/><category term="microprocesador disease"/><category term="redes sociales"/><category term="syadmin"/><title type="text">Nassa Technologies tm</title><subtitle type="html">"Tecnología en datos y redes"</subtitle><link href="http://nassatech.blogspot.com/feeds/posts/default" rel="http://schemas.google.com/g/2005#feed" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default?redirect=false" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/" rel="alternate" type="text/html"/><link href="http://pubsubhubbub.appspot.com/" rel="hub"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default?start-index=26&amp;max-results=25&amp;redirect=false" rel="next" type="application/atom+xml"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><generator uri="http://www.blogger.com" version="7.00">Blogger</generator><openSearch:totalResults>176</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-1830400163962166862</id><published>2013-10-24T23:33:00.001-03:00</published><updated>2013-10-24T23:33:20.370-03:00</updated><title type="text">Un informático en el lado del mal: Remote Heartbreak Attack: El ex vice-presidente se...</title><summary type="text">En el año 2008 en un paper titulado "Pacemakers and Implantable Cardiac Deﬁbrillators: Software Radio Attacks and Zero-Power Defenses" se especulaba sobre los riesgos de dotar a los marcapasos o los desfibriladores cardiacos implantados de características de conexión inalámbricas, ante la posibilidad de que un atacante interceptase y manipulase el protocolo para detener el sistema, obtener los </summary><link href="http://nassatech.blogspot.com/feeds/1830400163962166862/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/1830400163962166862?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/1830400163962166862" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/1830400163962166862" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2013/10/un-informatico-en-el-lado-del-mal.html" rel="alternate" title="Un informático en el lado del mal: Remote Heartbreak Attack: El ex vice-presidente se..." type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipCOs6r-CHD243bpBGY-Np4TnNO_TnZIaJ47sPtbf3N6zMiN2BcIvff6RsqzfiwkDLsQbuioWlglbroQJpS4jXI4m3y1B7V9rjh84YchRKav4ng6a6EhS5MxTXE_GPM6j4KdCDMAD3Uvs/s72-c/Pacemakers_paper.png" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-2520174096347371070</id><published>2013-07-25T18:58:00.001-03:00</published><updated>2013-07-25T18:58:40.027-03:00</updated><title type="text">Periódico The Guardian - Entrevista a Edward Snowden </title><summary type="text"/><link href="http://nassatech.blogspot.com/feeds/2520174096347371070/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/2520174096347371070?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/2520174096347371070" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/2520174096347371070" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2013/07/periodico-guardian-entrevista-edward.html" rel="alternate" title="Periódico The Guardian - Entrevista a Edward Snowden " type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-3917316893916525665</id><published>2012-09-19T07:47:00.001-03:00</published><updated>2012-09-19T07:47:01.832-03:00</updated><title type="text">Analizando posibles conexiones secretas</title><summary type="text">Analizando posibles conexiones secretas: 
Como&amp;nbsp;saben,&amp;nbsp;Windows lleva a cabo conexiones en segundo plano a sitios, software que trabaja en segundo plano y, en el peor de los casos, de virus o troyanos. Esto último, ocasiona que nuestra conexión a&amp;nbsp;Internet&amp;nbsp;se reduzca aunque tengamos cerrados los programas que normalmente requieren un gran ancho de banda. Ejemplo: FTP, P2P, etc.

</summary><link href="http://nassatech.blogspot.com/feeds/3917316893916525665/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/3917316893916525665?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/3917316893916525665" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/3917316893916525665" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2012/09/analizando-posibles-conexiones-secretas.html" rel="alternate" title="Analizando posibles conexiones secretas" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMWSlhESsVks1Ms4ZfNrFJL9gPYH0YAfE9mIWh3QVD1EYdSf4YSr7pA5D9QnlGmBELq4gXrTeQL5__0DjKYmKVu57AxvkuTAxX-Qf1sfRFhXY0vWJ_sXwdZ0tNNgb8vwhPSV_O_b_sSoGY/s72-c/1.jpg" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-7220920121071879012</id><published>2012-09-19T07:45:00.001-03:00</published><updated>2012-09-19T07:45:53.807-03:00</updated><title type="text">CRIME: el nuevo ataque a SSL/TLS sucesor de BEAST</title><summary type="text">CRIME: el nuevo ataque a SSL/TLS sucesor de BEAST: 
Juliano Rizzo y Thai Duong ya tuvieron una enorme repercusión cuando anunciaron en 2010 el ataque Padding Oracle (CBC) que afectó ampliamente ASP.NET y en 2011 el ataque a TLS 1.0/SSL 3.0 mediante BEAST que era capaz de descifrar las peticiones cliente 'al vuelo' y secuestrar sesiones hacia sitios tan sensibles como los de la banca on-line. 

</summary><link href="http://nassatech.blogspot.com/feeds/7220920121071879012/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/7220920121071879012?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/7220920121071879012" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/7220920121071879012" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2012/09/crime-el-nuevo-ataque-ssltls-sucesor-de.html" rel="alternate" title="CRIME: el nuevo ataque a SSL/TLS sucesor de BEAST" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4IuH3ixWZ4ndlx2CRSVX-88K0W-zEKyweYgwANIoDM6rqpzEHOXNn4IZw-5-iS2-cAGKV30OfAMR7t0JjkXb21IerNzt_jYeDpxNEWSA0zVwdHlBC1IIDbXIEY9EBqyX7c-tPKlp2_6RF/s72-c/abriendo_candado.png" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-8252988554665043504</id><published>2012-09-13T00:10:00.001-03:00</published><updated>2012-09-13T00:10:40.784-03:00</updated><title type="text">Solucionario de SAURON Hard (Dificultad Alta), CTF Challenge por @killr00t ganador del reto</title><summary type="text">Solucionario de SAURON Hard (Dificultad Alta), CTF Challenge por @killr00t ganador del reto: 
Solucionario propuesto por&amp;nbsp;@killr00t&amp;nbsp;al reto SAURON nivel Hard.&amp;nbsp;@killr00t&amp;nbsp;cumplió con el objetivo del desafío: Realizar un solucionario diferente a los publicados en internet (aunque en este solo había público uno para el nivel fácil), hacerse root del server y mostrarlo de manera </summary><link href="http://nassatech.blogspot.com/feeds/8252988554665043504/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/8252988554665043504?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/8252988554665043504" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/8252988554665043504" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2012/09/solucionario-de-sauron-hard-dificultad.html" rel="alternate" title="Solucionario de SAURON Hard (Dificultad Alta), CTF Challenge por @killr00t ganador del reto" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-6483189120966839408</id><published>2012-09-13T00:02:00.001-03:00</published><updated>2012-09-13T00:02:49.713-03:00</updated><title type="text">Julian Assange, el antiguo hacker que sigue desafiando a los grandes poderes</title><summary type="text">Julian Assange, el antiguo hacker que sigue desafiando a los grandes poderes: 
Pese a enfrentar un juicio de extradición, creador de WikiLeaks continúa divulgando información que pone en aprietos a gobiernos y empresas



El enigmático informático australiano Julian Assange sigue desafiando a los Gobiernos y poderes fácticos pese a estar sometido a un duro proceso judicial que él atribuye a una </summary><link href="http://nassatech.blogspot.com/feeds/6483189120966839408/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/6483189120966839408?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/6483189120966839408" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/6483189120966839408" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2012/09/julian-assange-el-antiguo-hacker-que.html" rel="alternate" title="Julian Assange, el antiguo hacker que sigue desafiando a los grandes poderes" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-2477842957680287286</id><published>2012-09-12T23:55:00.001-03:00</published><updated>2012-09-13T00:08:06.872-03:00</updated><title type="text">¿Bing poisoning?</title><summary type="text">¿Bing poisoning?: Las técnicas de Google poisoning o Google image poisoning son más que conocidas. Consisten en comprometer una página y hacer que se comporte diferente según de donde venga la visita. Los atacantes añaden código en la web para comprobar el "Referer". Si el visitante viene de Google, es redirigido a alguna página de spam o malware. Si no, la página se muestra sin problemas. De </summary><link href="http://nassatech.blogspot.com/feeds/2477842957680287286/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/2477842957680287286?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/2477842957680287286" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/2477842957680287286" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2012/09/bing-poisoning.html" rel="alternate" title="¿Bing poisoning?" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-47754108236756660</id><published>2012-09-12T23:53:00.001-03:00</published><updated>2012-09-12T23:53:04.165-03:00</updated><title type="text">Kylin OS (Sistema Operativo del Gobierno de China) basado en FreeBSD</title><summary type="text">Kylin OS (Sistema Operativo del Gobierno de China) basado en FreeBSD: 
Después de la reciente escalada de ciberataques producidos en territorio  Estadounidense y las posteriores acusaciones al Gobierno Chino de estar  creando un caldo de cultivo para una inminente Ciberguerra, ha surgido  información que indica que el Gobierno Chino ha desplegado un un nuevo  Sistema Operativo de nombre Kylin, </summary><link href="http://nassatech.blogspot.com/feeds/47754108236756660/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/47754108236756660?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/47754108236756660" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/47754108236756660" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2012/09/kylin-os-sistema-operativo-del-gobierno.html" rel="alternate" title="Kylin OS (Sistema Operativo del Gobierno de China) basado en FreeBSD" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://i50.tinypic.com/29eosht_th.png" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-1931416905124376079</id><published>2012-01-17T00:01:00.000-03:00</published><updated>2012-01-17T00:01:14.313-03:00</updated><title type="text">Explicacion de la ley SOPA</title><summary type="text"/><link href="http://nassatech.blogspot.com/feeds/1931416905124376079/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/1931416905124376079?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/1931416905124376079" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/1931416905124376079" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2012/01/explicacion-de-la-ley-sopa.html" rel="alternate" title="Explicacion de la ley SOPA" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/5fvwoHKj6cs/default.jpg" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-7703601237852655234</id><published>2011-12-22T23:26:00.001-03:00</published><updated>2011-12-22T23:26:36.318-03:00</updated><title type="text"/><summary type="text">
</summary><link href="http://nassatech.blogspot.com/feeds/7703601237852655234/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/7703601237852655234?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/7703601237852655234" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/7703601237852655234" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/12/blog-post.html" rel="alternate" title="" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyDFbKFmnEygrH1SNUR4qwKGvTD74r7m8LKlMWrIRhVPvrOQNcR-vnGJxY98Gpi80fhIEUCTBGjtNR2l9M8ZqGDr3X47YB60lJyyisHgHAzSt2Fqhzc-kXDN_AuSfSv8Qg3i6i6O07cm8/s72-c/Felices+fiestas.jpg" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-7274738344138341961</id><published>2011-11-03T23:44:00.001-03:00</published><updated>2011-11-03T23:44:13.123-03:00</updated><title type="text">International Kill-A-Zombie</title><summary type="text"/><link href="http://nassatech.blogspot.com/feeds/7274738344138341961/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/7274738344138341961?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/7274738344138341961" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/7274738344138341961" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/11/international-kill-zombie.html" rel="alternate" title="International Kill-A-Zombie" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/MXi_tKKePN4/default.jpg" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-4513535069657540215</id><published>2011-11-03T23:38:00.002-03:00</published><updated>2011-11-03T23:38:23.890-03:00</updated><title type="text">Excelente película</title><summary type="text"/><link href="http://nassatech.blogspot.com/feeds/4513535069657540215/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/4513535069657540215?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/4513535069657540215" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/4513535069657540215" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/11/excelente-pelicula.html" rel="alternate" title="Excelente película" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/JaFVr_cJJIY/default.jpg" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-7114372862132727622</id><published>2011-09-18T22:44:00.000-03:00</published><updated>2011-09-18T22:44:06.921-03:00</updated><title type="text">No se lo pierdan!</title><summary type="text">
ekoparty security conference reel 2010 ng from ekoparty on Vimeo.</summary><link href="http://nassatech.blogspot.com/feeds/7114372862132727622/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/7114372862132727622?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/7114372862132727622" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/7114372862132727622" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/09/no-se-lo-pierdan.html" rel="alternate" title="No se lo pierdan!" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-7325570637538025842</id><published>2011-08-22T21:51:00.000-03:00</published><updated>2011-08-22T21:51:42.773-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="GNOME"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu GNU/Linux"/><title type="text">Cambiar pantalla de desbloqueo en Ubuntu</title><summary type="text">Si hay cosas feas en Ubuntu es la pantalla de desbloqueo del protector de pantalla que viene por defecto pero siempre hay gente con habilidad y ganas de mejorarlo!

Tema newwave en gnome-lok.org:



wget http://gnome-look.org/CONTENT/content-files/125281-newwave-lock-dialog.tar.gz &amp;amp;&amp;amp; sudo tar -C /usr/share/gnome-screensaver -xzf 125281-newwave-lock-dialog.tar.gz &amp;amp;&amp;amp; gconftool-2 -</summary><link href="http://nassatech.blogspot.com/feeds/7325570637538025842/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/7325570637538025842?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/7325570637538025842" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/7325570637538025842" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/08/cambiar-pantalla-de-desbloqueo-en.html" rel="alternate" title="Cambiar pantalla de desbloqueo en Ubuntu" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzz0KDx1ASgkCcVknmlb0p5RxEFkPci0JD9Ao7U6_M_zRiDqCv1qTCysld-wCP49Oz0GYWJjrFqJhWIJgEmSaywSkuWkD_tyIt-PLhtYbwFnE2NMQoUlaZKDw7cOl5F3kyfgHGTFI1SoY/s72-c/new-wave-lock-dialog-theme.png" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-7287505398762704387</id><published>2011-08-21T22:05:00.002-03:00</published><updated>2011-08-21T22:08:38.004-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Seguridad informática"/><category scheme="http://www.blogger.com/atom/ns#" term="seguridad wi-fi"/><title type="text">MUNDO HACKER TV "EL PELIGRO DE LAS REDES WIFI</title><summary type="text"/><link href="http://nassatech.blogspot.com/feeds/7287505398762704387/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/7287505398762704387?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/7287505398762704387" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/7287505398762704387" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/08/mundo-hacker-tv-el-peligro-de-las-redes.html" rel="alternate" title="MUNDO HACKER TV &quot;EL PELIGRO DE LAS REDES WIFI" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-3225046724537820432</id><published>2011-08-12T18:43:00.001-03:00</published><updated>2011-08-12T18:50:02.083-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tecnologia"/><title type="text">Educación e innovación disruptiva</title><summary type="text">


</summary><link href="http://nassatech.blogspot.com/feeds/3225046724537820432/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/3225046724537820432?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/3225046724537820432" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/3225046724537820432" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/08/educacion-e-innovacion-disruptiva.html" rel="alternate" title="Educación e innovación disruptiva" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/_FsE8kFjRgQ/default.jpg" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-3506013942534364463</id><published>2011-07-16T18:05:00.000-03:00</published><updated>2011-07-16T18:05:38.515-03:00</updated><title type="text">Elección Root 2011 | #adminfest | #sysadminday</title><summary type="text">Elección Root 2011 | #adminfest | #sysadminday</summary><link href="http://nassatech.blogspot.com/feeds/3506013942534364463/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/3506013942534364463?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/3506013942534364463" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/3506013942534364463" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/07/eleccion-root-2011-adminfest.html" rel="alternate" title="Elección Root 2011 | #adminfest | #sysadminday" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-4501417390427075692</id><published>2011-07-16T18:04:00.000-03:00</published><updated>2011-07-16T18:04:13.558-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="administrador de sistemas"/><category scheme="http://www.blogger.com/atom/ns#" term="syadmin"/><title type="text">Adminfest</title><summary type="text">



</summary><link href="http://nassatech.blogspot.com/feeds/4501417390427075692/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/4501417390427075692?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/4501417390427075692" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/4501417390427075692" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/07/adminfest.html" rel="alternate" title="Adminfest" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/6EkHwSyi2ok/default.jpg" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-8787792577212114259</id><published>2011-07-09T00:11:00.000-03:00</published><updated>2012-09-18T18:25:48.294-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Broadcom 4313 en linux"/><title type="text">Broadcom 4313 en linux Solucionado</title><summary type="text">Compre un lindo laptop Lenovo V360 con Windows 7, pero quise instalar una&amp;nbsp;versión&amp;nbsp;de linux junto al windows como de costumbre.



Luego de superados los problemas&amp;nbsp;gráficos, me encuentro con la sorpresa de que la wireless no es bienvenida para el kernel.

Pase por las principales distros para ver cual me evitaba el trabajo y me instalaba&amp;nbsp;automáticamente&amp;nbsp;los drivers desde </summary><link href="http://nassatech.blogspot.com/feeds/8787792577212114259/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/8787792577212114259?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/8787792577212114259" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/8787792577212114259" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/07/broadcom-4313-en-linux-solucionado.html" rel="alternate" title="Broadcom 4313 en linux Solucionado" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-4097885642505106646</id><published>2011-05-23T19:42:00.001-03:00</published><updated>2011-08-05T00:06:31.812-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Seguridad informática"/><title type="text">Security By Default</title><summary type="text">El mejor Blog de seguridad&amp;nbsp;informática&amp;nbsp;y con un toque muy especial de humor!



















Realmente un gusto leerlos!
Y felicitaciones por el premio al mejor Blog de seguridad&amp;nbsp;informática 2010.&amp;nbsp;
Guillermo Monnereau</summary><link href="http://nassatech.blogspot.com/feeds/4097885642505106646/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/4097885642505106646?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/4097885642505106646" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/4097885642505106646" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/05/security-by-default.html" rel="alternate" title="Security By Default" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-AV01Ef4oqmhXTm88h0hdSwPfy_n4bfueqetFNouRRpSVmGFNbP1iblfrS4mNRdrPM6kFktUrjfesg6ly2TmUzyTQ_Rau6bCjhq9HfmzlR8e-kgljPIvwhYn_3pFW5D7Xa8pYuM7tLNM/s72-c/securitybydefault.JPG" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-6979910434604818929</id><published>2011-05-23T15:19:00.000-03:00</published><updated>2011-05-23T15:19:18.072-03:00</updated><title type="text">Según Sophos, Microsoft falsea datos de seguridad</title><summary type="text">
Es lo que afirma un analista de seguridad. Microsoft ha  declarado que los ataques de bloqueo a Internet Explorer 9 no están  aumentando, sin embargo, un investigador de Sophos afirma justo lo  contrario.
 “Están  mostrando únicamente la mitad de la ecuación”, ha declarado Chet  Wisniewski, un investigador de seguridad de Sophos, según informaciones  publicadas por PC World Profesional.  “Ponen </summary><link href="http://nassatech.blogspot.com/feeds/6979910434604818929/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/6979910434604818929?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/6979910434604818929" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/6979910434604818929" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/05/segun-sophos-microsoft-falsea-datos-de.html" rel="alternate" title="Según Sophos, Microsoft falsea datos de seguridad" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-647372880194437463</id><published>2011-05-23T15:11:00.000-03:00</published><updated>2011-05-23T15:11:39.019-03:00</updated><title type="text">Sourcefire IPS</title><summary type="text">
      Dear Guillermo Monnereau,  
      Your Sourcefire IPS is designed to defend your network from   today’s most sophisticated threats. But a network IPS is but one piece of   your organization’s IT security puzzle.
&lt;!--[if gte vml 1]&gt;                                                                                              &lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;
With some organizations </summary><link href="http://nassatech.blogspot.com/feeds/647372880194437463/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/647372880194437463?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/647372880194437463" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/647372880194437463" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/05/sourcefire-ips.html" rel="alternate" title="Sourcefire IPS" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-4354684993469093351</id><published>2011-05-23T14:46:00.000-03:00</published><updated>2011-05-23T14:46:28.695-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Seguridad informatica"/><title type="text">Denegación de servicio a través de los controladores Intel 10 Gigabit  Ethernet 82598 y 82599</title><summary type="text">Intel ha publicado una actualización de los controladores de los dispositivos Intel 10 Gigabit Ethernet 82598 y 82599 que solucionan un problema de seguridad. 
El fallo, del que no se han dado a conocer detalles específicos, podría permitir a un atacante remoto causar una denegación de servicio a través del envío de un paquete especialmente manipulado. 
Las actualizaciones publicadas están </summary><link href="http://nassatech.blogspot.com/feeds/4354684993469093351/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/4354684993469093351?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/4354684993469093351" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/4354684993469093351" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/05/denegacion-de-servicio-traves-de-los.html" rel="alternate" title="Denegación de servicio a través de los controladores Intel 10 Gigabit  Ethernet 82598 y 82599" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-4107650340552109161</id><published>2011-05-15T22:07:00.000-03:00</published><updated>2011-05-15T22:07:02.598-03:00</updated><title type="text">Los virus informáticos más dañinos de la historia</title><summary type="text">Los virus informáticos más dañinos de la historiaConoce alguno de los virus informáticos que han marcado la historia de la computación.- CIHPuso en jaque en 1998 a los computadores equipados con el sistema Windows 95, 98 y Me. Se estima que monetariamente generó daños que van entre los 20 y 80 millones de dólares.También conocido como Chernobyl, fue puesto en marcha en Taiwán y es famoso por ser </summary><link href="http://nassatech.blogspot.com/feeds/4107650340552109161/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/4107650340552109161?isPopup=true" rel="replies" title="2 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/4107650340552109161" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/4107650340552109161" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/05/los-virus-informaticos-mas-daninos-de.html" rel="alternate" title="Los virus informáticos más dañinos de la historia" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5930486795538605502.post-4849101637037387700</id><published>2011-03-16T20:38:00.000-03:00</published><updated>2011-03-16T20:38:50.986-03:00</updated><title type="text">Discussions in Google Docs</title><summary type="text"/><link href="http://nassatech.blogspot.com/feeds/4849101637037387700/comments/default" rel="replies" title="Comentarios de la entrada" type="application/atom+xml"/><link href="http://www.blogger.com/comment/fullpage/post/5930486795538605502/4849101637037387700?isPopup=true" rel="replies" title="0 Comentarios" type="text/html"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/4849101637037387700" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/5930486795538605502/posts/default/4849101637037387700" rel="self" type="application/atom+xml"/><link href="http://nassatech.blogspot.com/2011/03/discussions-in-google-docs.html" rel="alternate" title="Discussions in Google Docs" type="text/html"/><author><name>Sistemas</name><uri>http://www.blogger.com/profile/10571119103351790333</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/7zmOYziFKZw/default.jpg" width="72"/><thr:total>0</thr:total></entry></feed>